{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:35:25Z","timestamp":1759091725950,"version":"3.41.2"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T00:00:00Z","timestamp":1537315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T00:00:00Z","timestamp":1537315200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1238962","CCF-1111061"],"award-info":[{"award-number":["CNS-1238962","CCF-1111061"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-17-1-0232","W911NF-13-1-0421"],"award-info":[{"award-number":["W911NF-17-1-0232","W911NF-13-1-0421"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Dyn Games Appl"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s13235-018-0284-4","type":"journal-article","created":{"date-parts":[[2018,9,19]],"date-time":"2018-09-19T11:46:38Z","timestamp":1537357598000},"page":"914-941","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An Efficient Dynamic Allocation Mechanism for Security in Networks of Interdependent Strategic Agents"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1201-3074","authenticated-orcid":false,"given":"Farzaneh","family":"Farhadi","sequence":"first","affiliation":[]},{"given":"Hamidreza","family":"Tavafoghi","sequence":"additional","affiliation":[]},{"given":"Demosthenis","family":"Teneketzis","sequence":"additional","affiliation":[]},{"given":"S. Jamaloddin","family":"Golestani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,19]]},"reference":[{"issue":"1","key":"284_CR1","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s13235-010-0004-1","volume":"1","author":"D Acemoglu","year":"2011","unstructured":"Acemoglu D, Ozdaglar A (2011) Opinion dynamics and learning in social networks. Dyn Games Appl 1(1):3\u201349","journal-title":"Dyn Games Appl"},{"key":"284_CR2","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.3982\/ECTA6995","volume":"81","author":"S Athey","year":"2013","unstructured":"Athey S, Segal I (2013) An efficient dynamic mechanism. Econometrica 81:2463\u20132485","journal-title":"Econometrica"},{"issue":"2","key":"284_CR3","doi-asserted-by":"publisher","first-page":"771","DOI":"10.3982\/ECTA7260","volume":"78","author":"D Bergemann","year":"2010","unstructured":"Bergemann D, V\u00e4lim\u00e4ki J (2010) The dynamic pivot mechanism. Econometrica 78(2):771\u2013789","journal-title":"Econometrica"},{"key":"284_CR4","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199734023.001.0001","volume-title":"An introduction to the theory of mechanism design","author":"T B\u00f6rgers","year":"2015","unstructured":"B\u00f6rgers T, Krahmer D, Strausz R (2015) An introduction to the theory of mechanism design. Oxford University Press, Oxford"},{"key":"284_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78911-6","volume-title":"Mathematical epidemiology","author":"F Brauer","year":"2008","unstructured":"Brauer F, van den Driessche P, Wu J (2008) Mathematical epidemiology. Springer, Berlin, Germany"},{"issue":"2","key":"284_CR6","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/TIFS.2009.2019154","volume":"4","author":"L Chen","year":"2009","unstructured":"Chen L, Leneutre J (2009) A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans Inf Forensics Secur 4(2):165\u2013178","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"284_CR7","first-page":"19","volume":"2","author":"E Clarke","year":"1971","unstructured":"Clarke E (1971) Multipart pricing of public goods. Public Choice 2:19\u201333","journal-title":"Public Choice"},{"key":"284_CR8","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.2307\/1913096","volume":"56","author":"J Cremer","year":"1988","unstructured":"Cremer J, McLean RP (1988) Full extraction of the surplus in bayesian and dominant strategy auctions. Econometrica 56:1247","journal-title":"Econometrica"},{"issue":"1","key":"284_CR9","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/0047-2727(79)90043-4","volume":"11","author":"C d\u2019Aspremont","year":"1979","unstructured":"d\u2019Aspremont C, G\u00e9rard-Varet LA (1979) Incentives and incomplete information. J Public Econ 11(1):25\u201345","journal-title":"J Public Econ"},{"key":"284_CR10","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2016.0792","author":"K Drakopoulos","year":"2015","unstructured":"Drakopoulos K, Ozdaglar A, Tsitsiklis J (2015) When is a network epidemic hard to eliminate? Math Oper Res. https:\/\/doi.org\/10.1287\/moor.2016.0792","journal-title":"Math Oper Res"},{"issue":"2","key":"284_CR11","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TNSE.2015.2393291","volume":"1","author":"K Drakopoulos","year":"2014","unstructured":"Drakopoulos K, Ozdaglar A, Tsitsiklis JN (2014) An efficient curing policy for epidemics on graphs. IEEE Trans Netw Sci Eng 1(2):67\u201375","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"284_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2018.2823270","author":"F Farhadi","year":"2018","unstructured":"Farhadi F, Golestani SJ, Teneketzis D (2018) A surrogate optimization-based mechanism for resource allocation and routing in networks with strategic agents. IEEE Trans Autom Control. https:\/\/doi.org\/10.1109\/TAC.2018.2823270","journal-title":"IEEE Trans Autom Control"},{"key":"284_CR13","first-page":"86","volume-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","author":"Farzaneh Farhadi","year":"2017","unstructured":"Farhadi F, Tavafoghi H, Teneketzis D, Golestani J (2017) A dynamic incentive mechanism for security in networks of interdependent agents. In: GameNets 2017 proceedings game theory for networks: 7th international EAI conference. Springer International Publishing, Berlin, pp 86\u201396"},{"key":"284_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2553364","author":"A Fazeli","year":"2016","unstructured":"Fazeli A, Ajorlou A, Jadbabaie A (2016) Competitive diffusion in social networks: quality or seeding? IEEE Trans Control Netw Syst. https:\/\/doi.org\/10.1109\/TCNS.2016.2553364","journal-title":"IEEE Trans Control Netw Syst"},{"issue":"1","key":"284_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.2307\/2296617","volume":"38","author":"JW Friedman","year":"1971","unstructured":"Friedman JW (1971) A non-cooperative equilibrium for supergames. The Rev Econ Stud 38(1):1\u201312","journal-title":"The Rev Econ Stud"},{"key":"284_CR16","doi-asserted-by":"crossref","unstructured":"Ganesh A, Massoulie L, Towsley D (2005) The effect of network topology on the spread of epidemics. In: Proceedings IEEE 24th annual joint conference of the IEEE computer and communications societies, vol\u00a02","DOI":"10.1109\/INFCOM.2005.1498374"},{"key":"284_CR17","doi-asserted-by":"crossref","unstructured":"Grossklags J, Christin N, Chuang J (2008) Secure or insure?: A game-theoretic analysis of information security games. In: Proceedings of the 17th international conference on World Wide Web, WWW \u201908. ACM, pp. 209\u2013218","DOI":"10.1145\/1367497.1367526"},{"key":"284_CR18","first-page":"95","volume-title":"Handbook of Game Theory with Economic Applications","author":"Matthew O. Jackson","year":"2015","unstructured":"Jackson M, Zenou Y (2015) Games on networks. In: Petyon Young H, Zamir S (eds) Handbook of game theory with economic applications, vol\u00a04, chap.\u00a03. Elsevier, Amsterdam"},{"issue":"2","key":"284_CR19","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1109\/TNET.2010.2071397","volume":"19","author":"L Jiang","year":"2011","unstructured":"Jiang L, Anantharam V, Walrand J (2011) How bad are selfish investments in network security? IEEE\/ACM Trans Netw 19(2):549","journal-title":"IEEE\/ACM Trans Netw"},{"issue":"2","key":"284_CR20","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1109\/TAC.2011.2163353","volume":"57","author":"A Kakhbod","year":"2012","unstructured":"Kakhbod A, Teneketzis D (2012) An efficient game form for unicast service provisioning. IEEE Trans Autom Control 57(2):392","journal-title":"IEEE Trans Autom Control"},{"key":"284_CR21","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/BF02579150","volume":"4","author":"N Karmarkar","year":"1984","unstructured":"Karmarkar N (1984) A new polynomial-time algorithm for linear programming. Combinatorica 4:373\u2013395","journal-title":"Combinatorica"},{"issue":"4","key":"284_CR22","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1086\/261409","volume":"94","author":"ML Katz","year":"1986","unstructured":"Katz ML, Shapiro C (1986) Technology adoption in the presence of network externalities. J Polit Econ 94(4):822\u2013841","journal-title":"J Polit Econ"},{"key":"284_CR23","doi-asserted-by":"crossref","unstructured":"Khalili MM, Naghizadeh P, Liu M (2017) Designing cyber insurance policies in the presence of security interdependence. In: The 12th workshop on the economics of networks, systems and computation (NetEcon 2017)","DOI":"10.1145\/3106723.3106730"},{"key":"284_CR24","doi-asserted-by":"crossref","unstructured":"Khouzani MHR, Sarkar S, Altman E (2011) A dynamic game solution to malware attack. In: IEEE INFOCOM","DOI":"10.1109\/INFCOM.2011.5935025"},{"key":"284_CR25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611974263","volume-title":"Stochastic systems: estimation, identification, and adaptive control","author":"PR Kumar","year":"2015","unstructured":"Kumar PR, Varaiya P (2015) Stochastic systems: estimation, identification, and adaptive control, vol 75. SIAM, Philadelphia"},{"issue":"2","key":"284_CR26","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/A:1024119208153","volume":"26","author":"H Kunreuther","year":"2003","unstructured":"Kunreuther H, Heal G (2003) Interdependent security. J Risk Uncertain 26(2):231\u2013249","journal-title":"J Risk Uncertain"},{"issue":"2","key":"284_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2635673","volume":"47","author":"A Laszka","year":"2014","unstructured":"Laszka A, Felegyhazi M, Buttyan L (2014) A survey of interdependent information security games. ACM Comput Surv 47(2):1\u201338","journal-title":"ACM Comput Surv"},{"key":"284_CR28","doi-asserted-by":"crossref","unstructured":"Lelarge M (2009) Economics of malware: Epidemic risks model, network externalities and incentives. In: 2009 47th annual Allerton conference on communication, control, and computing (Allerton), pp 1353\u20131360","DOI":"10.1109\/ALLERTON.2009.5394516"},{"key":"284_CR29","doi-asserted-by":"crossref","first-page":"1494","DOI":"10.1109\/INFCOM.2009.5062066","volume":"2009","author":"M Lelarge","year":"2009","unstructured":"Lelarge M, Bolot J (2009) Economic incentives to increase security in the internet: the case for insurance. IEEE INFOCOM 2009:1494\u20131502","journal-title":"IEEE INFOCOM"},{"key":"284_CR30","doi-asserted-by":"crossref","unstructured":"Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM","DOI":"10.1109\/INFCOM.2007.155"},{"issue":"1","key":"284_CR31","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/SURV.2012.062612.00056","volume":"15","author":"X Liang","year":"2013","unstructured":"Liang X, Xiao Y (2013) Game theory for network security. IEEE Commun Surv Tutor 15(1):472","journal-title":"IEEE Commun Surv Tutor"},{"key":"284_CR32","doi-asserted-by":"crossref","unstructured":"Liu H (2014) Efficient dynamic mechanisms in environments with interdependent valuations. Available at SSRN 2504731","DOI":"10.2139\/ssrn.2504731"},{"issue":"3","key":"284_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2480741.2480742","volume":"45","author":"MH Manshaei","year":"2013","unstructured":"Manshaei MH, Zhu Q, Alpcan T, Basar T, Hubaux JP (2013) Game theory meets network security and privacy. ACM Comput Surv 45(3):1\u201339","journal-title":"ACM Comput Surv"},{"key":"#cr-split#-284_CR34.1","doi-asserted-by":"crossref","unstructured":"Maskin E (1999) Nash equilibrium and welfare optimality. Rev Econ Stud 66:23-38 . Reprinted in Laffont JJ","DOI":"10.1111\/1467-937X.00076"},{"key":"#cr-split#-284_CR34.2","unstructured":"(ed) The principal agent model: the economic theory of incentives. Edward Elgar, London (2003)"},{"issue":"2","key":"284_CR35","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0531(83)90048-0","volume":"29","author":"R Myerson","year":"1983","unstructured":"Myerson R, Satterthwaite MA (1983) Efficient mechanisms for bilateral trading. J Econ Theory 29(2):265\u2013281","journal-title":"J Econ Theory"},{"key":"284_CR36","first-page":"323","volume":"54","author":"RB Myerson","year":"1986","unstructured":"Myerson RB (1986) Multistage games with communication. Econom J Econ Soc 54:323","journal-title":"Econom J Econ Soc"},{"key":"284_CR37","unstructured":"Naghizadeh P, Liu M (2016) On the role of public and private assessments in security information sharing agreements. arXiv preprint arXiv:1604.04871"},{"key":"284_CR38","doi-asserted-by":"publisher","first-page":"2790","DOI":"10.1109\/TIFS.2016.2599005","volume":"11","author":"P Naghizadeh","year":"2016","unstructured":"Naghizadeh P, Liu M (2016) Opting out of incentive mechanisms: a study of security as a non-excludable public good. IEEE Trans Inf Forensics Secur 11:2790\u20132803","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"284_CR39","unstructured":"Nowzari C, Preciado VM, Pappas GJ (2015) Analysis and control of epidemics: a survey of spreading processes on complex networks. arXiv:1505.00768"},{"key":"284_CR40","unstructured":"Ogut H, Menon N, Raghunathan S (2005) Cyber insurance and it security investment: impact of interdependence risk. In: WEIS"},{"issue":"2","key":"284_CR41","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1109\/TAC.2012.2209949","volume":"58","author":"G Theodorakopoulos","year":"2013","unstructured":"Theodorakopoulos G, Boudec JYL, Baras JS (2013) Selfish response to epidemic propagation. IEEE Trans Autom Control 58(2):363\u2013376","journal-title":"IEEE Trans Autom Control"},{"key":"284_CR42","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1109\/TCNS.2015.2426755","volume":"2","author":"S Trajanovski","year":"2015","unstructured":"Trajanovski S, Hayel Y, Altman E, Wang H, Mieghem PV (2015) Decentralized protection strategies against sis epidemics in networks. IEEE Trans Control Netw Syst 2:406\u2013419","journal-title":"IEEE Trans Control Netw Syst"},{"key":"284_CR43","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W Vickrey","year":"1961","unstructured":"Vickrey W (1961) Counterspeculation, auctions and competitive sealed tenders. J Finance 16:8\u201337","journal-title":"J Finance"}],"container-title":["Dynamic Games and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-018-0284-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13235-018-0284-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13235-018-0284-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T21:31:33Z","timestamp":1751923893000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13235-018-0284-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,19]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["284"],"URL":"https:\/\/doi.org\/10.1007\/s13235-018-0284-4","relation":{},"ISSN":["2153-0785","2153-0793"],"issn-type":[{"type":"print","value":"2153-0785"},{"type":"electronic","value":"2153-0793"}],"subject":[],"published":{"date-parts":[[2018,9,19]]},"assertion":[{"value":"19 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}